Pages Navigation Menu

Features

Glaring biometrics gap could close

Posted by on Nov 15, 2012 in Afghanistan, Beats, Big Data, Comms, Intel Analysis, News, The Homeland | Comments Off on Glaring biometrics gap could close

Glaring biometrics gap could close

When investigators in Afghanistan find fingerprints on defused improvised explosive devices, or soldiers gather fingerprints from villagers, they have no automated way to feed the prints into the database the U.S. set up in 2004 to keep potential terrorists out of the U.S.

Immigration and intelligence officials rely on the US-VISIT database to vet the identities of visitors against terrorist watchlists.

The Department of Homeland Security wants to close the biometrics gap by setting up an automated link between US-VISIT and the military. The agency has made a pitch to the Pentagon to get it done.

“We’re waiting to see how DoD wants to proceed,” said Greg Ambrose, chief information officer for the Untied States Visitor and Immigrant Status Indicator Technology program.

Ambrose discussed the proposal in a Nov. 13 presentation to the IEEE homeland security conference in Waltham, Mass.

As it stands, fingerprints from the military must be manually fed into the US-VISIT system. “It’s more of a sneaker-net sharing of data,” Ambrose said.

“Certainly the opportunity exists there for us to use the data that DoD has captured on the battlefield, or perhaps latent fingerprints on IEDs, to provide another decision point for Department of Homeland Security individuals,” he said.

The only network link between the battlefield and US-VISIT is an indirect one. US-VISIT has an automated interface with the FBI, and the FBI has an automated interface with the Defense Department, Ambrose said.

The goal is a “more automated interface so both groups can query in real time each other’s systems,” he said.

The proposal was made through the multi-agency board that coordinates US-VISIT.

Homeland techies enter survival mode

Posted by on Nov 14, 2012 in Beats, News, The Homeland | Comments Off on Homeland techies enter survival mode

It’s not unusual for an agency director to want more funds for his organization, but it is unusual for that director to speak frankly about it.

And so it is with Paul Benda, director of the Homeland Security Advanced Research Projects Agency, who was in Waltham, Mass., Nov. 13 to speak to technologists at the annual IEEE conference here.

Benda's big message was that to do business with his agency, technologists must focus on products that promise direct impacts on operators, such as border patrol agents, and in the near term, meaning the next three or four years. Delivering the same capability with less money definitely counts as an impact, he said.

“I am not interested in science projects,” Benda explained. “My survival as an S and T organization depends on my ability to brief in terms of what the operators care about, that the secretary of Homeland Security cares about, and that the Hill cares about,” he added. “That’s kind of the evolution of where we’re going – much less of an advanced research projects agency.”

Benda’s PowerPoint explained the shift with an f word – foraging – as in foraging for technologies that can be assembled into products.

Is this constrained mission okay with Benda? I asked him that after his talk, and it didn’t sound like it. He pined over the hundreds of millions of dollars the country spends on “one Joint Strike Fighter,” and he said the country “needs to do some nation building here at home.”

Benda’s annual budget is around $500 million – the equivalent of one office at DARPA, where Benda used to work. That’s in a good year, when Congress hasn’t slashed his spending, as it did for fiscal year 2012 to the tune of 48 percent.

Benda said the cut provided funds for FEMA disaster response. It might also have inspired his determination to make a difference to operators sooner rather than later.

Of course, Benda’s agency is far from the only U.S. group looking at national security technologies. There’s DARPA; there’s the Intelligence Advanced Research Projects Activity; the CIA’s InQTel venture capital arm; and the National Geospatial-Intelligence Agency’s InnoVision directorate

Maybe they’re digging for the breakthroughs that HSARPA can’t afford? Benda and others here don’t think so.

“DNS Security is a perfect example,” Benda said, referring to his agency’s program to secure the Internet’s domain name system, which has been targeted by malware. No other agency has the mission to protect that system, Benda said. Ditto for the “bio attack response stuff,” he said.

At least for now, though, Benda leads an advanced research group that doesn’t do advanced research, and one that’s nestled in the Department of Homeland Security’s Science and Technology directorate, but does not do science projects.

Stomping cognitive bias

How technology could help

Posted by on Nov 12, 2012 in deep dive, Features, News | 2 comments

Stomping cognitive bias

Imagine you’re the intelligence analyst of the future and you think you’ve just solved a vexing international puzzle for your leaders, when suddenly a gentle voice rises from your computer: “Excuse me Dave, other explanations with more weight are available. Would you like to see them?”

This kind of ghost in the machine is called a software agent. Technologists are almost certain to avoid any similarities in their designs to H.A.L, the all powerful computer in “2001: A Space Odyssey.” But software agents are, in fact, a serious idea for mitigating cognitive biases – the brain’s natural tendency to find shortcuts through complex information.

    Intelligence managers took on the bias problem after the Sept. 11 terror attacks, and redoubled their efforts after the wildly wrong 2002 national intelligence estimate about Iraq’s weapons of mass destruction. For the most part, agencies addressed bias by training analysts to use new structured analytic techniques – software is now used to chart and visualize evidence, arguments and logic.

    It’s hard to train away all cognitive biases, though, because the human mind innately applies mental shortcuts when faced with big data dumps. The mind falls back easily on previous experiences, for example, which can lead to confirmation bias. Cognitive biases should not be confused with stereotypes or prejudices. They’re much more subtle, cognitive experts say.

    Scientists such as those at Raytheon think the time is right for science and technology to play a larger role in combating bias – but with limits. If software agents were to be deployed – one researcher says their use in the community is “incipient” at this point – analysts would have to retain the power to take or leave the computer’s advice.

    “The analyst’s reaction to a tool like that would depend on how intrusive it is -- whether it’s Big Brother,” says former intelligence analyst James Steiner, who retired from the CIA in 2005 and teaches at Rockefeller College, an arm of the State University of New York at Albany.

    This article is based on interviews with cognitive researchers, former analysts and industry experts. It shows that the community has options it has yet to exercise. Software agents are just one. Experts applaud the structured analytics trend but they decry the lack of quantitative evidence about their effectiveness in different scenarios. What if information technology could be applied to monitor analytical strategies and outcomes over time? Some of the structured techniques have yet to be institutionalized out of concern that they could overburden time-pressed analysts who find old-fashioned intuition to be a lot faster.

    Raytheon is emerging as the most outspoken advocate of applying information technology and experimentation to the cognitive bias problem. The company wants to monitor the decisions of analysts in lab exercises, during training, and eventually in real time while they’re working. The monitoring could help the community assess which techniques work best, and give analysts instant feedback so they can avoid mistakes, rather than simply leaving an audit trail for investigators.

    “Awareness alone isn’t enough to overcome (bias) – this is what research has shown. You have to have some way to intervene when the bias is emerging,” says Raytheon researcher and PhD student Don Kretz, who studies cognitive bias in complex problem solving scenarios.

    Kretz’s words echo those in a prepared statement from IARPA, the Intelligence Advanced Research Projects Activity: “Research to date has found that simply knowing about the bias is not sufficient to help the individual avoid the bias.”

    IARPA wants to see if specialized video games can improve training.

    Raytheon wants to do even more. Installation of software agents is one idea.

    Rand’s Gregory Treverton, who oversaw the drafting of national intelligence estimates from 1993 to 19995, says software agents might actually empower analysts if they are implemented in a non-heavy handed way.

    “One of the things that people learn best from, the psychologists tell us, is feedback. And the closer it is to the event the better,” he says.

    GAME TIME

    Last June, 27 Raytheon employees, mostly from the engineering ranks, volunteered to participate in a one-day intelligence analysis exercise. The purpose was to show how elaborate games might be used to compare different structured analytic techniques for effectiveness. Raytheon plans to release the paper Nov. 15 at the IEEE Homeland Security Technologies conference in Waltham, Mass.

    The company hopes the exercise and a similar one in August will prompt its mission partners – meaning intelligence agencies – to assign working analysts to participate in one or more exercises late this year or early next. Talks are underway, Kretz says.

    In the June pilot, the volunteers were given fictional intelligence reports, cell call transcripts, and embassy reports describing three bombings near the Green Zone in Baghdad. The information was drawn from a library of synthetic counterinsurgency, or SYNCOIN, scenarios developed by Penn State University with funds from the Army Research Office. Participants had to figure out who planted the bombs and who the intended targets were.

    The game designers made things difficult for the participants by including facts intended to draw out anchoring biases – the tendency of human minds to glom onto evidence supporting an initial hypothesis – and confirmation biases, the tendency to put more weight on evidence that confirms an underlying belief.

    The participants were briefed on three  techniques for "debiasing" their analysis and given simple software tools. Raytheon calls these techniques analytic multipliers.

    Some participants used link analysis software to chart the relationships among people, organizations, objects and events.

    Others used an information extraction and weighting technique to assign numbers from 1 to 10 to specific pieces of evidence based on how critical they saw them – 10 being the most critical. The evidence and numbers were typed into spread sheets.

    Others used software to draw up matrices documenting the competing explanations and the evidence supporting them. That technique is called Analysis of Competing Hypotheses or ACH.

    EARLY RESULTS

    How did the comparison turn out? The first thing Raytheon wants you to know is that picking a winner was not the main point. The purpose was to develop an experimental protocol to show how the community could, over time, assemble quantitative information to document the effectiveness of different techniques.

    For CIA-funded researcher Richards Heuer, it’s about time someone gathered performance data about the structured techniques he advocates: “This is exactly what we need more of -- empirical testing and documentation of the effectiveness or the ineffectiveness of various analytic tools and a better understanding of which tools are best used for which type of problem assembled over time,” he said by email.

    Raytheon has discussed its research with Heuer, but he is not affiliated with the Raytheon team.

    To the degree we should care about the result, it was good news for advocates of ACH, a 30-year old structured technique developed by Heuer.

    “The Analysis of Competing Hypotheses technique did in fact improve judgment the most,” says Kretz who is one of the paper’s authors and is scheduled to speak at the IEEE conference.

    Heuer came up with ACH in the 1980s after retiring from the CIA and continuing his research as a contractor to the agency. His goal was to improve analysis of the Soviet Union:

    “When analysts were asked if they thought the Soviets were deliberately trying to deceive us on a specific point, they would almost invariably say ‘No’, because they didn’t see any evidence of it,” Heuer recalls. “What they didn’t recognize was that if the deception was being done well, they shouldn’t expect to see evidence of it.”

    ACH helped the CIA sort deception from reality. For about 15 years, that’s the only reason it was taught and used, says Heuer.

    Then came the Sept. 11 attacks and the Iraq weapons fiasco. The agencies took a fresh look at ACH and other structured techniques. In 2010, Heuer and Randolph Pherson authored an unclassified book, “Structured Analytic Techniques for Intelligence Analysis,” which explained how the techniques could help analysts in intelligence, law enforcement and even the business world.

    Heuer cautions that ACH is not a “cure-all” for all analysis problems even though it shined in the Raytheon exercise.

    Some researchers suspect ACH has the most impact for novice or new analysts, which could explain why it came out on top among engineers pretending to be analysts.

    If Raytheon convinces intelligence agencies to play, the June exercise could go down as one of the turning points in the fight against bias. The company insists its advocacy is not about winning the next big contract or selling the agencies more software.

    “They’ve got shelves and shelves full of tools that they’ve bought and paid for that they don’t use,” Kretz says. “We’re not trying to develop more stuff like that. We want them to be partners in this.”

    TEXT: Petraeus resignation letter to CIA employees

    Posted by on Nov 9, 2012 in News | Comments Off on TEXT: Petraeus resignation letter to CIA employees

    TEXT: Petraeus resignation letter to CIA employees

    Gen. David H. Petraeus in 2011

    President Obama accepted the resignation of CIA Director David H. Petraeus today in a phone call. Petraeus offered his resignation yesterday in a meeting with Obama at the White House, explaining "the circumstances behind" his decision, a White House official said. Petraeus had an extramarital affair. CIA posted this statement on the agency web site at 2:50 p.m.:

    Message from General David H. Petraeus (US Army Retired)

    Statement to Employees from General David H. Petraeus (US Army Retired)

    November 9, 2012

    Yesterday afternoon, I went to the White House and asked the President to be allowed, for personal reasons, to resign from my position as D/CIA. After being married for over 37 years, I showed extremely poor judgment by engaging in an extramarital affair. Such behavior is unacceptable, both as a husband and as the leader of an organization such as ours. This afternoon, the President graciously accepted my resignation.

    As I depart Langley, I want you to know that it has been the greatest of privileges to have served with you, the officers of our Nation’s Silent Service, a work force that is truly exceptional in every regard. Indeed, you did extraordinary work on a host of critical missions during my time as director, and I am deeply grateful to you for that.

    Teddy Roosevelt once observed that life’s greatest gift is the opportunity to work hard at work worth doing. I will always treasure my opportunity to have done that with you and I will always regret the circumstances that brought that work with you to an end.

    Thank you for your extraordinary service to our country, and best wishes for continued success in the important endeavors that lie ahead for our country and our Agency.

    With admiration and appreciation,

    David H. Petraeus

    IARPA is serious about video games

    Posted by on Nov 9, 2012 in Intel Analysis, News, The Homeland, Uncategorized | Comments Off on IARPA is serious about video games

    IARPA is serious about video games

    By next June, college students and professional intelligence analysts could be playing video games paid for by the intelligence community.

    The Intelligence Advanced Research Projects Activity wants to see if it can root out cognitive biases by having future analysts and veterans play specialized video games during training or professional workshops.

    Soldiers train with video games. Credit: U.S. Army

    IARPA calls the program Sirius as a play on the term serious games, which is what the simulation industry calls video games that are both instructive and fun.

    The agency sent Deep Dive a prepared statement explaining that “cognitive biases are notoriously resistant to training.”

    Cognitive biases shouldn't be confused with easy to spot prejudices or stereotypes, brain experts say. They're the shortcuts that our minds naturally seek when we’re presented with massive data dumps.

    In September, IARPA chose five teams to build competing versions of the games for assessment next year following trials by college students. IARPA is in talks with potential “transition partners in the U.S. Government” to try out the games next year together with students. Those tests will have to show a 50 percent reduction in bias for the developers to proceed any further.

    IARPA won’t say how much it’ll pay for the games, but last November, Raytheon BBN Technologies put out a press release placing the potential value of its multiyear contract at $10.5 million. The company was not selected for the new phase that began last month.

    The winning teams are led by:

    Applied Research Associates

    Boeing

    SET Corporation (Now part of SAIC)

    State University of New York at Albany

    University of Oklahoma

    OPINION: The dangers of Benghazi politicking

    Posted by on Nov 4, 2012 in News, Opinion | Comments Off on OPINION: The dangers of Benghazi politicking

    OPINION: The dangers of Benghazi politicking

    The Obama administration has entered dangerous territory by letting unnamed senior intelligence officials join the public fray over the Sept. 11 attack on the U.S. consulate in Benghazi.

    The bodies of four slain Americans arrive at Joint Base Andrews outside Washington. Credit: U.S. State Department

    The administration’s frustration at the media’s treatment of Benghazi is understandable. It used to take secret tapes or a source in a parking garage to allege a cover-up. Now all it takes is a TV segment and a Twitter account.

    Allowing intelligence officials to rebut Republican talking points is not the right solution. The strategy threatens to bring down the protective wall erected between politics and the intelligence community after the intelligence abuses of the 1960s and ’70s. That wall took a hit in 2002 and 2003 when George Tenet let the Bush administration’s zest to invade Iraq color the community’s analytical processes.

    The Obama administration risks damaging the wall further for little return. A few words from unnamed officials are unlikely to convince anyone of anything in today’s charged environment.

    Careful readers will wonder why they should trust a prepared statement and timeline provided to news outlets but not posted on the public websites of the CIA, the Office of Director of National Intelligence or the White House, The comments also address only one aspect of the Benghazi controversy – whether the CIA delayed sending help to the consulate. Does this mean all other rumors of incompetence and cover-ups are true?

    Perhaps most dangerous of all, the loosely attributed comments could inspire others to straighten out their bosses.

    If you doubt that could happen, take a look at the epilogue of “No Easy Day,” the initially anonymous account of the Bin Laden killing by Matt Bissonnette, one of the Navy SEALs who fired the kill shots into Bin Laden’s convulsing chest.

    “We always prided ourselves for being the quiet professionals, but the more I saw coverage of the raid, the more I wanted to set the record straight,” writes Bissonnette, then working under the pen name Mark Owen.

    How could Bissonnette have the gall? Well, think back to the days after the raid. The White House gave background briefings to favored media outlets; CIA Director Leon Panetta and White House counterterrorism adviser John Brennan stood on separate stages and contradicted each other; clarifications were issued.

    The result was a tangled mess, with no one sure whose words to trust. It was a lot like what we’re seeing in the Benghazi case.

    There was another option available to the administration in both the Bin Laden and Benghazi cases.

    The White House could have used the months and years preceding the raid to line up a retired prosecutor or investigator to quickly assembly an unclassified account in the event Bin Laden were apprehended. Bissonnette and others could have been interviewed, perhaps staving off publication of “No Easy Day” or at least making it a much less interesting read.

    In the Benghazi case, something similar could have been done and might still be possible. The equivalent of a newspaper’s ombudsmen should be assigned to quickly assemble an unclassified account of what the administration knows and does not know about the attack and its circumstances.

    Quickly releasing transparent, on-the-record information would be a radical departure from the typical Washington approach of dragging out official investigations for months or years.
    It’s worth remembering President Obama came into office lambasting those who played “the same old Washington games” while “expecting different results.”

    Whoever wins Tuesday will need an intelligence community that is trusted as nonpartisan. This is no time for Washington games, from either Democrats or Republicans.

    Intel cuts deepen

    Posted by on Nov 2, 2012 in Beats, Intel Analysis, News, The Homeland | Comments Off on Intel cuts deepen

    Intel cuts deepen

    The race is on between the budget knife and the intelligence community’s information technology overhaul.

    The U.S. appropriated $75.4 billion toward intelligence in 2012, a drop of 4 percent compared to 2011, according to figures released by intelligence director Jim Clapper's office and the Pentagon.

    The intelligence community is banking that it can roll out modernized information technologies quickly enough to avoid deep cuts to collections and analysis as it struggles to meet the White House budget reduction target.

    If you happened to be watching the CNN news ticker, the 2012 reduction was not, in fact, the first time the intelligence budget has been cut since the Sept. 11 terror attacks. The U.S. appropriated $78.6 billion in 2011, down from $80.1 billion in 2010, a decline of 1.8 percent.

    U.S. law requires the Office of the Director of National Intelligence to reveal its portion of the intelligence appropriation, called the National Intelligence Program, within 30 days of the close of the fiscal year on Sept. 30. The Pentagon traditionally follows by releasing its appropriation for the Military Intelligence Program. Taken together, these two categories constitute the top line intelligence appropriation.

    One school of thought says that releasing these figures will ensure a vigorous public debate over the appropriate level of intelligence spending. The appropriations for specific technology and networking programs, however, remain disguised within the annual defense appropriation act, which makes it hard to publicly assess the community's spending priorities.

    For 2012, the figures break down like this:

    The U.S. appropriated $21.5 billion in 2012 for the Military Intelligence Program, down from $24 billion in 2011 and $27 billion in 2010.

    The U.S. appropriated $53.9 billion in 2012 for the National Intelligence Program, down from $54.6 billion in 2011 and $53.1 billion in 2010.

    OPINION: The secret weakness banks must fix

    Posted by on Oct 28, 2012 in Opinion | Comments Off on OPINION: The secret weakness banks must fix

    OPINION: The secret weakness banks must fix

    In the late 1990s, large companies began installing newly-developed numeric Secure Shell keys to guard access to the software running their servers. Banks, retailers, governmental departments and other large organizations were increasingly relying on these servers to store sensitive customer information, from bank account balances to health data to Social Security information. The idea was to ensure that only network administrators could access the increasingly automated software tasked with keeping the servers up to date.

    The SSH protocol devised by my company, Helsinki-based SSH Communications Security, was intended to add security to that process. Technologically speaking, it has performed very well. The keys have proven difficult to break through brute-force hacking attacks.

    The success of a technology, however, can never be assessed in isolation from human factors, and unfortunately, that’s what’s happened in this case. Some organizations have no process for controlling who has access to their keys. Others have never updated their keys. This creates the specter of a disgruntled or corrupt former employee disseminating access to the software underlying an organization’s most sensitive servers.

    Simply put, poor key management has turned the SSH keys into vectors for injecting viruses into large businesses.

    The problem of mismanaged SSH keys is a vast one. Many large organizations have hundreds of thousands to over a million keys installed on their servers, since they often do not have a way to find or remove keys once an employee transfers responsibilities or leaves. Many organizations have no process for approving and enforcing who can grant permanent access to the servers via these keys. One study we conducted in 2012 at the invitation of a large bank found that 10 percent of the bank’s one million keys granted unlimited administrative access to production servers running critical banking applications with access to sensitive customer data.

    A virus can spread over the Internet in less than a minute. Poor SSH key management exposes private intranets to a similarly-speedy risk: a worm attack. Once inside an organization’s network, a worm can use improperly managed SSH keys to spread from server to server. With so many keys, odds are the worm will infect nearly all servers – including disaster recovery and backup systems that are typically also managed using such keys – in a manner of seconds to minutes.

    Once inside a server, the worm may open a backdoor, steal or alter data, subvert encryption systems or databases, or outright destroy the server and any data (including backup media) accessible to the server.

    Worm attacks so far have been limited in scope but they should serve as a warning sign. A May 2012 IBM X-Force study, “2012 Cyber Security Threat Landscape,” concluded that most attacks against Linux/Unix servers utilized SSH. In 1988, the Morris Worm brought down the Internet, in part using very similar attacks.

    So far, we’ve been spared the worst-case scenario in which flawed SSH key management allows a worm to spred globally via the public Internet. That scenario is still possible, however, because large organizations rely on SSH public key encryption for linking their IT systems internally, as well as for external file transfers and remote system administration.

    Imagine life suddenly without banks, retail chains, logistics, manufacturing, government or power for weeks. That is why the security industry, the government and our customers need to come together to fix the SSH key management vulnerability.

    How did we end up here? All major security standards require controlling access to servers and proper termination of access. Key-based access, however, has slipped under the radar of IT departments because it is deeply technical and obscure. Mainstream security professionals and auditors – even chief information security officers – are scarcely aware of the problem. Most companies have no idea how many SSH keys they have, and have no concept of the scope or potential impact of the issue.

    Remedying the problem involves discovering all SSH keys within the network, eliminating keys that are no longer in use, preventing unauthorized key-based access grants and establishing process to regularly change all keys so that copied keys cease to work.

    This is an issue that any large organization trusted with sensitive data – banks, governments, retailers and others – must take steps to resolve. My company is working with organizations to audit and centralize their key management processes, but frankly put, the problem is too big for any one company to solve. We would welcome a vigorous competition for cost-effective, efficient SSH key management services.

    Standards organizations such as NIST and the Internet Engineering Task Force can help mitigate the problem by specifically including SSH key management in published best practices. Furthermore, if the U.S. federal government eventually does move forward with comprehensive cybersecurity legislation, SSH key management and other automated access mechanisms (including Kerberos-based access) must be included.

    We can do it, but we need to start now.

      Odierno talks technology

      Posted by on Oct 23, 2012 in Comms, News, Uncategorized | Comments Off on Odierno talks technology

      Odierno talks technology

      The Army’s chief of staff enjoys challenging the technological status quo.

      Ask Gen. Raymond Odierno about radios and he gushes over the capabilities of "iPhones," a term he uses generically for smartphones. Ask him about the controversy over Palantir’s link analysis software, and he says the Army might yet figure out how to include it in the service’s intelligence production and sharing toolbox.

      Army Gen. Raymond Odierno

      Adding the Palantir software to the Distributed Common Ground System-Army would be a big breakthrough for the Palo Alto company. The Palantir software is popular among analysts outside the Army as an easy way to visualize the linkages among terror suspects or criminals.

      The Army has tested the software in the lab and in Afghanistan with good results but has resisted embracing it in the DCGS-A network for reasons other than the software's performance. The Army says Palantir's unique design makes it hard to ingest or share data created by non-Palantir software. For two years, Palantir has sought to shoehorn the software into DCGS-A by appealing to Congress and to the media via proxies.

      The Army wants all new software to follow a guide called DI2E, short for the Defense Intelligence Information Enterprise, which is the equivalent of a building code book for software developers.

      “Right now, there’s some proprietary issues with Palantir. We’re working those now,” Odierno said after a press briefing at the Army Association’s annual conference in Washington, D.C.

      At the same time, he warned against hyping the significance of whether or not Palantir’s software is added to DCGS-A:

      “What I got frustrated over is -- it’s not DCGS versus Palantir. DCGS-A is much larger than what Palantir is delivering,” he said.

      Odierno also defended the performance of DCGS-A: “It’s a huge network, which I think is very, very good.”

      As for the smartphones, Odierno said getting more of them into the hands of soldiers could help commanders understand events in the field in close to real time.

      “One of our weaknesses now (is) we have all these sensors out there -- squads of people who have information, and when they report it up, it takes a very long time. With these iPhones, it can almost be done instantaneously,” he said.

      DIA chief faces surprising foe

      Posted by on Oct 10, 2012 in Afghanistan, Beats, Intel Analysis, Interviews, News | Comments Off on DIA chief faces surprising foe

      DIA chief faces surprising foe

      The Defense Intelligence Agency director is getting serious push-back from within his agency over his plan to reorganize around one of the agency's core missions: collections of intelligence abroad.

      U.S. Army Lt. Gen. Michael T. Flynn had a quick answer when asked what he would do if people in his agency resist the changes -- “Move them or fire them,” he told an audience at the GEOINT symposium in Orlando. The comment drew rare applause from the group of industry executives and intelligence officials.

      Afterwards, in a brief interview with Deep Dive, Flynn showed no remorse about that simple answer. “It’s a bureaucracy,” he said. “People like their little worlds.”

      Lt. Gen. Michael T. Flynn on stage at GEOINT symposium

      In April, DIA began the process of converting the Defense Counterintelligence and HUMINT Center, known as DX, into the Defense Clandestine Service, a name chosen to mirror the CIA’s National Clandestine Service.

      Flynn arrived at DIA in July promising big changes, and he used his GEOINT speech to explain how the clandestine service figures in. “I’m going to use (the Defense Clandestine Service) to integrate the entire agency. This is not a marginal adjustment for DIA. This is a major adjustment for national security,” he said.

      Flynn said the U.S. will need to work abroad with partner nations to avoid strategic surprises in what he expects will remain a tumultuous century.

      “I believe that for the rest of my time, we will be in this era of persistent conflict,” he said.

      The changes won’t just involve members of the clandestine service. DIA analysts will be sent to embassies around the world, rather than being restricted to joint intelligence operations centers, he said.

      Deploying DIA staff more widely would provide “better finger tip feel, better sense of what’s going on, whether it’s in Afghanistan, whether it’s in Central or South Africa, whether it’s in South America, or whether it’s in the Asia Pacific basin somewhere.”

      Flynn took pains to emphasize that the changes would not come at the expense of work in Afghanistan.

      “My number one priority is Afghanistan in terms of the tactical operational level of stuff that we get involved in,” he said.

      The reorganization around the clandestine service is to be described in a document called Vision 2020.

      “Vision 2020 is a team effort that will take a broad look at everything we do across the Defense Intelligence Agency and look at how we need to operate in the future. Certainly over the coarse of the rest of this decade and probably at least 2025, 2030 and as far out as we can see.”

      After his talk, Flynn said news reports casting the clandestine service as an entirely new entity were overstated.

      “It’s an evolution,” he said.

      He said a formal notification to Congress about the reorganization would be forthcoming, but that the agency has conducted briefings on Capitol Hill.

      “We have to keep congressional staffs and member in the loop along this path,” he added.